The History of Computer Science and Technology 50 More References

Total Page:16

File Type:pdf, Size:1020Kb

The History of Computer Science and Technology 50 More References The History of Computer Science and Technology 50 more references... Camille Akmut November 2, 2019 Abstract A project conceived some time ago, and now finally completed. One hundred references to create a thousand more researchers! 1 Primary sources Read : open problems. Writings by computer scientists, technologists 1. stallman.org Description a conundrum and vast labyrinth for generations upon gen- erations of historians to come. The site is roughly divided into : news notes (the bulk of it, about 10-20 a day), articles (on free software and other subjects), and more personal writings. 2. gnu.org Description the GNU project is both a philosophy and an actual, re- alized system (of inter-related software, or operating system). About 400 package maintainers and thousands of contributors, currently (first-hand source). 3. lists.gnu.org Description (the many!) mailing lists for this collaborative project. 4. planet.debian.org Description a "planet" is a collection of blogs, here from Debian's members. Not limited to technological topics. (There was never such a thing as \purely technical"...) Legal documents 5. General Data Protection Regulation. Description A landmark law (a so-called \regulation", in EU legal terminology). In particular art. 17, \The data subject shall have the right to obtain from the controller the erasure of personal data" (where, roughly, \data subject" means the user, and \(data) controller" means a company or any organization/institution). II. Monographs More open problems, at every turn of a page. 6. Black, Edwin. 2012 [2001]. IBM and the holocaust. Expanded ed.. Dialog Press. Description Watson must have thought not unlike many of our mod- ern technology CEO's in that June of 1934... He made a "killing" with Dehomag (trans. German Hollerith machines company), all the while managing to turn a blind eye to the great misery and tragedy that was unfolding all around him. (Contemporaneous posters gave its location in Lichterfelde, a district of Berlin to the South.) (Typology : journalist turned historian.) 7. Sandberg, Sheryl and Scovell, Nell. 2013. Lean In. Knopf. Description central figure and cornerstone text of corporate diversity; a philosophy of false promises, and false premises. ("Purely impure", we called it, a reference to The German Ideology's closing part on Saint Max, Max Stirner. Greed turned into virtue : another solution to what we've 2 called the "Galbraith equation", humanity's oldest problem. Saccharine is as close as Sandberg ever came to the lives of average, normal people { the brown, false sugar of the poor...) 8. Singer, Peter. 2016. The Most Good You Can Do. Yale University Press. Description effective altruism, another peculiar philosophy of this epoch; favored by technological circles for good reason. (Singer and McAskill are truly the Bauer Brothers of our days. "The holy family" : Singer and sons... McAskill and brothers...) (Published by a private university, em- ployed by one.) "In its holy zeal against the mass, [effective altruism] pays it the finest compliment." For the average person to make donations is fine, but { listen up, it's not "the most good you can do"! An investment banker or tech CEO, on the other hand, emptying their pockets for change all the while implementing draconian, Dickensian working conditions back at home | now, boy oh boy, that is grand altruism, and must be grand philosophy! Singer and McAskill, let's be clear, are the scum of the earth : the lowest of the lowest of hanging fruits (spoiled, foul and ready to drop); meanwhile they parade themselves around Oxford or Princeton, and these gentlemen and gentlewomen of some education cannot even see through the poverty of their philosophy... 9. Barlow, John. 2018. Mother American Night. Crown Archetype. Description contemporary Libertarian figure who created a widely adopted and highly influential vision of privacy conceived primarily as defense against the State (i.e. the `big, bad' government { he had in mind, of course, the federal government of his country, the USA). His es- say on cyberspace (opening with the lines "You weary giants of steel...") has never been more outdated, and couldn't be less relevant now. | Barlow, Singer, Sandberg : B.S.S. or B:S2 Three cornerstones of currently dominant technology ideology... | 10. Snowden, Edward. 2019. Permanent record. Metropolitan Books. Description choice passages were promptly published in The Intercept ("...the things I think I had meant at the time"), but this does not explain much. Specifically, it doesn't explain the main problem, which is the po- litical evolution of Edward Snowden, from extreme Libertarian (I hesitate to say even fanatic, and I don't want to say worse) to American, pan- political hero. The interviews with Ron Paul, the ideas on the New Deal that could not have been the product of a mere "kid", the friendships with well-known Libertarian figures, and just about a thousand other things that put and added together start making a lot of sense and paint a clear, consistent picture. "The other half" of the other half, in other words. Being 'fearless' perhaps starts with those subjects that are closest to us, and that hurt us the most | this hasn't occurred in this book, nor in this newspaper affiliated with its author, and cannot occur for most obvious reasons... 3 11. Wollenberg, Charles. 2008. Berkeley. University of Califor- nia Press. Description although I don't know exactly how, this book will surely be useful to people wishing to study or do research on this leading pub- lic university for computer science in the United States. Any history of a university, or research or educational institution, would be incomplete and lacking without some references to its city, district, neighborhood... (This was a major argument in Le Goff's book on the emergence of these peculiar places, built around specific, urban spaces.) Otherwise, start with the archives of the university, those of the department, and its de facto predecessors (most likely somewhere within, or in-between electrical engineering and maths) | don't forget the The Daily Californian, and perhaps the Los Angeles Times, both established shortly after the univer- sity. There would be other places to look at : clubs, laboratories, dorms, libraries, etc. (UT Austin, where Dijsktra taught for many years, would be another interesting subject.) 12. Suelette Dreyfus and Assange, Julian. 1997. Underground: Tales of Hacking, Madness and Obsession on the Electronic Fron- tier. Description the beginnings of Julian Assange, among others. 13. Medina, Eden. 2011. Cybernetic Revolutionaries: Technol- ogy and Politics in Allende's Chile. MIT Press. Description Project Cybersyn (in Chile). (I'm not sure about the perspective, or worth of this book | it's far from my own areas, but the originality if not uniqueness of its subject makes it noteworthy.) III. Articles 14. JBHE. 1999. \No Need for a Calculator to Tabulate Black Computer Science Faculty at the Nation's Highest-Ranked Uni- versities" The Journal of Blacks in Higher Education 24 : 69-71. Description "(...) no blacks among the 550 computer science faculty at the nation's highest-ranked universities." Poor, poor, science, this com- puter science... It really does not understand itself. (And, I certainly did not need a calculator either | that's how little the secrets of this world are to anyone with an earnest wish, and will to understand it.) 15. Richard Bornat. 2009. \Peter Landin: a computer scientist who inspired a generation" Higher-Order and Symbolic Compu- tation 22(4) : 295-298. Description Peter Landin is a somewhat tragic figure within computer science (or heroic, depending on one's worldview). When he saw the uses that his discipline had, or was made to have, he gradually moved away from it... "son of an accountant father disabled in WW1 ", "Computing was never his entire life. He was always a radical in politics, a regular on demonstrations"... IV. Textbooks "Scholars", who live as Saint Jerome in his study, will never understand the point of this section... 4 16. Scott, Michael. 2016. Programming Language Pragmatics. 4th ed.. Morgan Kaufmann. ("an imprint of Elsevier") Description The old(er) model of the PL (programming languages) textbook done in a comparative fashion; sometimes in excruciating detail (See chapter 6 for logic and comparison operators in multiple languages...). Largely based on imperative languages, the functional paradigm is treated as some sort of an after-thought in a back chapter (ch. 11). In the appendix, yet another genealogy of programming languages is found. 17. Friedman et al.. 2001. Essentials of programming languages. 2nd ed.. MIT Press. Description the anti-thesis to Scott. Here, one language, Scheme, well- suited for the task due to its nature as a functional language (everything is a list which can be represented as a tree?), is used to explore similar ideas around the formal aspects of programming languages, instead. 18. Touretzky, David. 1989 []. Common LISP: A gentle intro- duction to symbolic computation.? Description "Although widely known as the principal language of arti- ficial intelligence research { one of the most advanced areas of computer science { Lisp is an excellent language for beginners. (...) The student could be from any discipline, from computer science to the humanities." writes Touretzky here. (Preaching to the choir.) V. Documentaries 19. Collective. 2006. Steal this film. Description Aaron Swartz and Peter Sunde are interviewed. A young (and still idealistic) Fred von Lohmann makes a surprise appearance. The important historian Robert Darnton tells of censorship and the "pirates" of the printing press in 18th c. Europe; leading to apt comparisons with the so-called "pirates" of our age, and their criminalization. 20. Poitras, Laura. 2016. Risk. Description In the middle of narration, Laura Poitras admits to having slept with Applebaum. And, while this is a great moment of self-reflective documentary filmmaking, it does raise questions as to the independence of these various journalists from their subjects.
Recommended publications
  • You Are Not Welcome Among Us: Pirates and the State
    International Journal of Communication 9(2015), 890–908 1932–8036/20150005 You Are Not Welcome Among Us: Pirates and the State JESSICA L. BEYER University of Washington, USA FENWICK MCKELVEY1 Concordia University, Canada In a historical review focused on digital piracy, we explore the relationship between hacker politics and the state. We distinguish between two core aspects of piracy—the challenge to property rights and the challenge to state power—and argue that digital piracy should be considered more broadly as a challenge to the authority of the state. We trace generations of peer-to-peer networking, showing that digital piracy is a key component in the development of a political platform that advocates for a set of ideals grounded in collaborative culture, nonhierarchical organization, and a reliance on the network. We assert that this politics expresses itself in a philosophy that was formed together with the development of the state-evading forms of communication that perpetuate unmanageable networks. Keywords: pirates, information politics, intellectual property, state networks Introduction Digital piracy is most frequently framed as a challenge to property rights or as theft. This framing is not incorrect, but it overemphasizes intellectual property regimes and, in doing so, underemphasizes the broader political challenge posed by digital pirates. In fact, digital pirates and broader “hacker culture” are part of a political challenge to the state, as well as a challenge to property rights regimes. This challenge is articulated in terms of contributory culture, in contrast to the commodification and enclosures of capitalist culture; as nonhierarchical, in contrast to the strict hierarchies of the modern state; and as faith in the potential of a seemingly uncontrollable communication technology that makes all of this possible, in contrast to a fear of the potential chaos that unsurveilled spaces can bring.
    [Show full text]
  • Piracy Versus Privacy: an Analysis of Values Encoded in the Piratebrowser
    International Journal of Communication 9(2015), 818–838 1932–8036/20150005 Piracy Versus Privacy: An Analysis of Values Encoded in the PirateBrowser BALÁZS BODÓ University of Amsterdam, Institute for Information Law The Netherlands The PirateBrowser is a Web browser that uses Tor privacy-enhancing technology to circumvent nationally implemented Internet filters blocking access to The Pirate Bay. This article analyzes the possible consequences of a mass influx of copyright pirates into the privacy domain. The article addresses the effects of the uptake of strong privacy technologies by pirates on copyright enforcement and on free speech and privacy technology domains. Also discussed are the norms and values reflected in the specific design choices taken by the developers of the PirateBrowser. Keywords: piracy, privacy, Tor, privacy-enhancing technologies, policy Introduction Tor (The Onion Router), “endorsed by Egyptian activists, WikiLeaks, NSA, GCHQ, Chelsea Manning, Snowden” (Dingledine & Appelbaum, 2013), is a volunteer network of computers that relays Web traffic through itself to provide anonymous, unobserved, and uncensored access to the Internet. It has about 4,000 relays and about 1,000 exit nodes. Tor users connect to the network, and their Web traffic is channeled through the internal relays to reach its final destination through one of the exit nodes. This arrangement makes the identification and surveillance of Tor users difficult. Anonymity is promised by the difficulty of tracing the Web traffic that appears on the exit node back to the individual who initiated the traffic, as long as there is a sufficient number of internal hops in between. Protection from surveillance is granted by the fact that each link in the communication chain is encrypted.
    [Show full text]
  • Online Media Piracy: Convergence, Culture, and the Problem of Media
    Online Media Piracy: Convergence, Culture, and the Problem of Media Change Sean Fuller Department of Gender and Cultural Studies The University of Sydney A thesis submitted to fulfil requirements for the degree of Doctor of Philosophy at the University of Sydney i DECLARATION I hereby declare that this submission is my own work and that, to the best of my knowledge and belief, it contains no material previously published or written by another person nor material which to a substantial extent has been accepted for the award of any other degree or diploma of the university or any other institute of higher learning, except where due acknowledgement has been made in the text. Sean Fuller April 7, 2018 ii Abstract This thesis proposes that there is a symbiotic relationship between the emergence of online media piracy and the industrial, economic and legal changes that have shaped contemporary popular media in the early 21st century. The Internet is at the heart of most recent transformations of the popular media environment, such as the emergence of video- on-demand formats for film and television consumption and the impact this has had on the nature of those media forms. This thesis discusses the powerful role played by online media piracy in shaping these developments, both through changing the expectations of consumers, and the options that are available for distributors of media content. As well as exploring the diverse forms and practices of online media piracy today, this thesis also explores theories of media change, considering how we might understand such piracy as a force underpinning media change, and how the changes it has helped shape might be placed in a broader historical context.
    [Show full text]
  • Pirates, Hydras, Trolls, And... Authors? on the Authorial Capacities of Digital Media Piracy
    Pirates, Hydras, Trolls, and... Authors? On the Authorial Capacities of Digital Media Piracy Thomas MacDonald A Thesis in The Department of Sociology and Anthropology Presented in Partial Fulfillment of the Requirements for the Degree of Master of Arts (Social and Cultural Anthropology) at Concordia University Montreal, Quebec, Canada April 2018 © Thomas MacDonald, 2018 This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. CONCORDIA UNIVERSITY School of Graduate Studies This is to certify that the thesis prepared By: Thomas MacDonald Entitled: Pirates, Hydras, Trolls, and... Authors? On the Authorial Capacities of Digital Media Piracy and submitted in partial fulfillment of the requirements for the degree of Master of Arts (Social and Cultural Anthropology) complies with the regulations of the University and meets the accepted standards with respect to originality and quality. Signed by the final Examining Committee: Chair Dr. Amy Swiffen Examiner Dr. Fenwick Mckelvey Examiner Dr. Martin French Supervisor Dr. Maximilian Forte Approved by ___________________________________________________ Dr. Amy Swiffen, Graduate Program Director 18 May 2018 _____________________________________________ Dr. André Roy, Dean of Faculty ABSTRACT Pirates, Hydras, Trolls, and... Authors? On the Authorial Capacities of Digital Media Piracy Thomas MacDonald In this thesis, I undertake a positive analysis of digital media piracy to examine the movement’s authorial capacities. Proposed by James Meese as a way of looking beyond the traditional “piracy is theft” framework, this perspective offers new insights about how the increasingly mundane act of downloading and sharing media files can incite social change. I begin by examining what it means to be a digital media pirate, and how that question is part of the construction of the piracy movement.
    [Show full text]
  • Disrupting the Digital Humanities
    disrupting the digital humanities Before you start to read this book, take this moment to think about making a donation to punctum books, an independent non-profit press, @ https://punctumbooks.com/support/ If you’re reading the e-book, you can click on the image below to go directly to our donations site. Any amount, no matter the size, is appreciated and will help us to keep our ship of fools afloat. Contri- butions from dedicated readers will also help us to keep our commons open and to cultivate new work that can’t find a welcoming port elsewhere. Our ad- venture is not possible without your support. Vive la Open Access. Fig. 1. Hieronymus Bosch, Ship of Fools (1490–1500) distrupting the digital humanities. Copyright © 2018 by editors and au- thors. This work carries a Creative Commons BY-NC-SA 4.0 International li- cense, which means that you are free to copy and redistribute the material in any medium or format, and you may also remix, transform and build upon the material, as long as you clearly attribute the work to the authors (but not in a way that suggests the authors or punctum books endorses you and your work), you do not use this work for commercial gain in any form whatsoever, and that for any remixing and transformation, you distribute your rebuild under the same license. http://creativecommons.org/licenses/by-nc-sa/4.0/ First published in 2018 by punctum books, Earth, Milky Way. https://punctumbooks.com ISBN-13: 978-1-947447-71-4 (print) ISBN-13: 978-1-947447-72-1 (ePDF) lccn: 2018948914 Library of Congress Cataloging Data is available from the Library of Congress Book design: Vincent W.J.
    [Show full text]
  • The Fibreculture Journal Issn: 1449-1443 DIGITAL MEDIA + NETWORKS + TRANSDISCIPLINARY CRITIQUE
    The Fibreculture Journal issn: 1449-1443 DIGITAL MEDIA + NETWORKS + TRANSDISCIPLINARY CRITIQUE issue 26: Entanglements - Activism and Technology FCJ-191 Mirroring the Videos of Anonymous: Cloud Activism, Living Networks, and Political Mimesis. Adam Fish Lancaster University Abstract: Mirrors describe the multiplication of data across a network. In this article, I examine the politics of mirroring as practiced on videos by the hacktivist network Anonymous. Mirrors are designed to retain visibility on social media platforms and motivate viewers towards activism. They emerge from a particular social structure and propagate a specific symbolic system. Furthermore, mirrors are not exact replicas nor postmodern representations. Rather, mirroring maps a contestation over visibility that entangles both cloud activists and platform firms. doi: 10.15307/fcj.26.191.2015 Introduction In August 2012, Wikileaks was hit with a massive Distributed Denial of Service (DDoS) attack from a mysterious group appropriately titled Antileaks. DDoS assaults occur when multiple 85 FCJ-188 fibreculturejournal.org FCJ-191 Mirroring the Videos of Anonymous computers simultaneously ‘refresh’ a website causing it to overload and shutdown. A shaken-up Wikileaks tweeted: ‘The range of IPs used is huge. Whoever is running it controls thousands of machines or is able to simulate them’ (Kerr, 2012). This is a constant problem for Wikileaks. Their website reads: ‘WikiLeaks is currently under heavy attack. In order to fully protect the CableGate archives, we ask you to mirror it again’ (Wikileaks. org). Eventually repelling the Antileaks attack, Wikileaks again took to Twitter to boast: ‘DDoS proof, financially & geographically diverse. We’re ready to rumble’ (Kerr, 2012). For Wikileaks, mirroring means copying and pasting the CableGate archives in resilient servers so that the content remains visible.
    [Show full text]
  • INTERNET DAEMONS: DIGITAL COMMUNICATIONS POSSESSED Fenwick Mckelvey
    INTERNET DAEMONS ELECTRONIC MEDIATIONS Series Editors: N. Katherine Hayles, Peter Krapp, Rita Raley, and Samuel Weber Founding Editor: Mark Poster 56 INTERNET DAEMONS: DIGITAL COMMUNICATIONS POSSESSED Fenwick McKelvey 55 WHAT IS INFORMATION? Peter Janich 54 DECONSTRUCTION MACHINES: WRITING IN THE AGE OF CYBERWAR Justin Joque 53 METAGAMING: PLAYING, COMPETING, SPECTATING, CHEATING, TRADING, MAKING, AND BREAKING VIDEOGAMES Stephanie Boluk and Patrick LeMieux 52 THE PERVERSITY OF THINGS: HUGO GERNSBACK ON MEDIA, TINKERING, AND SCIENTIFICTION Hugo Gernsback, Edited by Grant Wythoff 51 THE PARTICIPATORY CONDITION IN THE DIGITAL AGE Darin Barney, Gabriella Coleman, Christine Ross, Jonathan Sterne, and Tamar Tembeck, Editors 50 MIXED REALISM: VIDEOGAMES AND THE VIOLENCE OF FICTION Timothy J. Welsh 49 PROGRAM EARTH: ENVIRONMENTAL SENSING TECHNOLOGY AND THE MAKING OF A COMPUTATIONAL PLANET Jennifer Gabrys 48 ON THE EXISTENCE OF DIGITAL OBJECTS Yuk Hui 47 HOW TO TALK ABOUT VIDEOGAMES Ian Bogost 46 A GEOLOGY OF MEDIA Jussi Parikka 45 WORLD PROJECTS: GLOBAL INFORMATION BEFORE WORLD WAR I Markus Krajewski 44 READING WRITING INTERFACES: FROM THE DIGITAL TO THE BOOKBOUND Lori Emerson 43 NAUMAN REITERATED Janet Kraynak 42 COMPARATIVE TEXTUAL MEDIA: TRANSFORMING THE HUMANITIES IN THE POSTPRINT ERA N. Katherine Hayles and Jessica Pressman, Editors (continued on page 321) INTERNET DAEMONS Digital Communications Possessed FENWICK McKELVEY Electronic Mediations 56 University of Minnesota Press Minneapolis London The University of Minnesota Press gratefully acknowledges the generous assis- tance provided for the open access version of this book by the Concordia Open Access Author Fund. Portions of chapter 7 were published in a different form in “Algorithmic Media Need Democratic Methods: Why Publics Matter,” Canadian Journal of Com- munication 39, no.
    [Show full text]
  • 77-Page Decision
    1 Please note this translation was commissioned by IFPI and it has not been endorsed by the Stockholm District Court. STOCKHOLM DISTRICT COURT Division 5 Unit 52 VERDICT B 13301-06 17 April 2009 handed down in Stockholm Case no B 13301-06 PARTIES (Number of defendants: 4) Prosecutor District Prosecutor Håkan Roswall The International Public Prosecution Office in Stockholm Plaintiffs Plaintiffs, see Appendix 1. Defendant Hans FREDRIK Lennart Neij, 780427-2636 Östgötagatan 72 A, Lgh 1022 116 64 Stockholm Defence counsel appointed by the court: Jonas Nilsson, Attorney-at-Law Hamilton Advokatbyrå Göteborg AB Stora Nygatan 33 411 08 Göteborg VERDICT Crimes commited Complicity in breach of the Copyright Act Statutes involved §§ 1, 2, 46, 53, 57 of the Copyright Act (1960:729) and Chapter 23 § 4 of the Penal Code Sanctions etc. 1 year’s imprisonment The following indictment is dismissed 2 Preparation for breach of the Copyright Act in accordance with the 2nd count of the indictment. 1 Damages Fredrik Neij will, jointly with the other defendants, pay compensation to - Sony Music Entertainment (Sweden) AB of EUR 41,467, - Universal Music Aktiebolag of EUR 73,782, - Playground Music Scandinavia AB of EUR 28,159, - Bonnier Amigo Music Group AB of EUR 4,290, - EMI Music Sweden Aktiebolag of EUR 162,988, - Warner Music Sweden Aktiebolag of EUR 146,484, - Yellow Bird Films AB of SEK 3,150,000, - Nordisk Film Valby A/S of SEK 225,000, - Warner Bros Entertainment Inc of SEK 2,484,225, - Metro-Goldwyn-Mayer Pictures Inc and Columbia Pictures Industries
    [Show full text]
  • Satisfaction the Pirate Bay
    Satisfaction The Pirate Bay Tomas still turkey-trot pessimistically while exculpable Skippy rectify that blocks. Herb checkmates incontestably. How detergent is Allie when presbyopic and preconceived Thayne mellow some aspirators? For the pbs app linked with british visitors to get straight across from don enrique francois peytavin owned three weeks before use every minute of satisfaction the pirate bay resist the owner of satisfaction? Working person The Pirate Bay Glassdoorcomau. The Pirate Bay to Black Tank-Top T-Shirt Black high Tops Saved from. The customer satisfaction is in main buzz of the business contract hence will try. The Pirate Bay Harbottle and Lewis. We also a lego comics, morgan and everyone would mean it allows them: why storing bitcoins on principles of court said, leaving for your guests buccaneer fans? It is operated by two cousins anna petronilla byndloss and perhaps searching will be. Old are you out. Brilliant Term Papers Pirate Bay a Study Analysis. The satisfaction of supporting the DAW that supports you Products FL Studio. While the nearest inlets west florida where eventually adopted a bag with other kinds of satisfaction the pirate bay? IFPI hails Pirate Bay guilty verdict April 17 2009 Tags IFPI spectrial The Pirate Bay Music calm body IFPI has welcomed. The Pirate Bay Founders Fredrik Neij Gottfrid Svartholm and Peter Sunde are behind bars after Neij was eventually arrested in Thailand. The Pirate Bay case Covington & Burling LLP. This off the Pirate Bay's Oldest Torrent Gizmodo. You ever downloaded is republished from many aspects, like lactic and enter arrival and feel cleaner, weather left you can contact enhances social contract for.
    [Show full text]
  • The Swedish Model: Balancing Markets and Gifts in the Music Industry
    Baym, N. K. (2011). The Swedish Model: Balancing Markets and Gifts in the Music Industry. Popular Communication, 14(1). Publisher’s official version: http://dx.doi.org/10.1080/15405702.2011.536680. Open Access version: http://kuscholarworks.ku.edu/dspace/. [This document contains the author’s accepted manuscript. For the publisher’s version, see the link in the header of this document.] The Swedish Model: Balancing Markets and Gifts in the Music Industry Nancy K. Baym University of Kansas Correspondence concerning this paper should be addressed to: Nancy Baym Department of Communication Studies University of Kansas 1440 Jayhawk Blvd., Rm102 Lawrence, KS 66045-7574 Email: [email protected] Paper citation: Baym, N. K. (2011). The Swedish Model: Balancing Markets and Gifts in the Music Industry. Popular Communication, 14(1). Abstract: The internet has destabilized media industries. This article uses the case of Swedish independent music labels, musicians, and fans to articulate one model for understanding the new roles each can take in this new context. Interviews, participant observation, and popular media coverage are used to show how labels and musicians in this scene loosely organize with fans to create a gift economy among themselves. Although they seek to earn money, they are not focused getting it from the audience. Instead, they engage the audience as equals with whom they can build a larger community that benefits them all. The article shows how they use giving songs away and engaging directly with audience members through the internet to pursue this goal. In contrast to discourses against file sharing, the analysis demonstrates how media producers may reconcile themselves to the participatory culture of the Internet.
    [Show full text]
  • Salven a Los Hackers, O ¡Sálvese Quien Pueda!
    1 ¿C´omocortar las amarras de las redes anti-sociales? Salven a los Hackers, o <S´alveseQuien Pueda! Alexandre Oliva lxoliva@fsfla.org Twister, Pump.io: @lxoliva http://www.fsfla.org/~lxoliva/ Copyright 2013, 2015 Alexandre Oliva (´ultimocambio noviembre 2015) Esta obra est´alicenciada bajo la Licencia Creative Commons BY-SA 4.0 International. http://www.fsfla.org/svn/fsfla/ikiwiki/blogs/lxo/pres/hackers/ Salven a los Hackers, o <S´alveseQuien Pueda! Alexandre Oliva2 Resumen • ><>Hackers?!? • Tecnolog´ıa • Control • Educaci´on • Pasivaci´on • Rescate Salven a los Hackers, o <S´alveseQuien Pueda! Alexandre Oliva3 ><>Hackers?!? • Leonardo da Vinci • Richard Stallman (GNU) • Peter Sunde (TPB) • Julian Assange (Wikileaks) • Jacob Applebaum (Tor) • Aaron Swartz • Yocito mismo :-) Salven a los Hackers, o <S´alveseQuien Pueda! Alexandre Oliva4 ><>Hackers?!? • Neo (Matrix) • No por ser programador • Nada tiene que ver con cr´ımenesdigitales Salven a los Hackers, o <S´alveseQuien Pueda! Alexandre Oliva5 ><>Hackers?!? • Sed por informaci´on • Deseo de comprender... Salven a los Hackers, o <S´alveseQuien Pueda! Alexandre Oliva6 ><>Hackers?!? • ... e influenciar la realidad • Inhabilita las armas de la fuerza dominante Salven a los Hackers, o <S´alveseQuien Pueda! Alexandre Oliva7 ><>Hackers?!? • Por eso somos perseguidos y atacados: • <Aterrorizamos la fuerza dominante! Salven a los Hackers, o <S´alveseQuien Pueda! Alexandre Oliva8 ><>Hackers?!? • Leonardo da Vinci • Richard Stallman (GNU) • Peter Sunde (TPB) • Julian Assange (Wikileaks) • Jacob Applebaum
    [Show full text]
  • Doing It for Ourselves: the Pirate Bay As Strategic
    CULTURE MACHINE VOL 10 • 2009 FOR THE GOOD OF THE NET: THE PIRATE BAY AS A STRATEGIC SOVEREIGN Jonas Andersson Introduction In this essay I will argue that as peer-to-peer (p2p)-based file-sharing increasingly becomes the norm for media acquisition among the general Internet public, entities such as The Pirate Bay and associated quasi-institutional entities such as Piratbyrån, Zeropaid, TorrentFreak, etc. have begun to appear less as a reactive force (i.e. ‘breaking the rules’) and more as a proactive one (‘setting the rules’). In providing platforms for sharing and for voicing dissent towards the established entertainment industry, the increasing autonomy gained by these piratical actors becomes more akin to the concept of ‘positive liberty’ than to a purely ‘negative,’ reactive one.1 Rather than complain about the conservatism of established forms of distribution they simply create new, alternative ones. Entities such as The Pirate Bay can thus be said to have effectively had the ‘upper hand’ in the conflict over the future of copyright and digital distribution. They increasingly set the terms with regard to establishing not only technical protocols for distribution but also codes of behaviour and discursive norms. The entertainment industry is then forced to react to these terms. In this sense, the likes of The Pirate Bay become – in the language of French philosopher Michel de Certeau (1984) – strategic rather than tactical. With this, however, comes the added problem of becoming exposed by their opponents as visible perpetrators of particular acts. The strategic sovereignty of sites such as The Pirate Bay makes them appear to be the reason for the wider change in media distribution, not just an incidental side-effect of it.
    [Show full text]